New Stories

From FRAUD ASSURE

White Paper: How to Defend Your Network Against the New SIM Server Threat

by Dan Baker

White Paper: How to Defend Your Network Against the New SIM Server Threat

SIM box bypass is a very stubborn fraud problem: fraudsters are succeeding despite carriers‘ best efforts to defeat the fraud.  This white paper explains the impact of SIM Servers as a powerful stealth weapon of the fraudsters.  In turn, the paper discusses new technologies and strategies that can defeat the more sophisticated types of SIM box fraud emerging.

From FRAUD ASSURE

Intelligent Routing: The Case for Blocking IRSF Fraud at the SIP Session Border Controller

interview with Jim Dalton

A bad fraud event can be a huge loss, especially to OTT players who provide a VoIP service.  In this interview, you’ll learn about an anti-fraud solution that works in concert with  intelligent routing.

From FRAUD ASSURE

A Privacy-Enabled Data Exchange that Expands Analytics Uses in Fraud, Credit Risk and Beyond

interview with Michelle Wheeler

Analytics data today is managed in a privacy-negligent way.  This interview discusses an ingenious privacy and analytics exchange that allows telecoms, banks, and money lenders to trade fraud, credit risk and other data with each other in complete confidence and control.

More Stories

Will Real-Time Decisioning Save Big Data Analytics from Overblown Hype? From ANALYTICS

Will Real-Time Decisioning Save Big Data Analytics from Overblown Hype?

interview with Tom Erskine

Telecom analytics is more than just collecting and analyzing data.  It’s also about taking action — correct action — often in real-time and across a complex provisioning environment.  In this interview you’ll hear how next best actions are creating value in retention and upselling through a more flexible, business-process driven approach.

From FRAUD ASSURE

From Rules Design to Adaptive Learning Systems in Telecom Fraud Control

interview with Shankar Palaniandy

Adaptive and behaviorial learning systems are at the forefront of R&D in telecom fraud management systems.  Here an expert developer explains their usefulness in use cases such as IRSF detection, subscription fraud, application fraud, and voice biometrics.

Protecting 900+ MVNOs around the Globe from IRSF Fraud Pirates From FRAUD ASSURE

Protecting 900+ MVNOs around the Globe from IRSF Fraud Pirates

interview with Colin Yates

Telecom fraudsters are seeking a new, more vulnerable path to riches.  Their target: 900+ MVNOs around the globe who generally own no mobile networks, but sell mobile service virtually.  This interview with a fraud control expert explains what steps MVNOs must take to protect themselves from IRSF fraud.

A Big Data Starter Kit in the Cloud: How Smaller Operators Can Get Rolling with Advanced Analytics From ANALYTICS

A Big Data Starter Kit in the Cloud: How Smaller Operators Can Get Rolling with Advanced Analytics

interview with Ryan Guthrie

Medium to small operators know “big data” is out there alright, but technical staffing and cost issues have held them back from implementing it.  This interview discusses the advantages of moving advanced analytics to the cloud where operators can get up and running faster and at lower cost.

Insider Fraud: How to Create an Anti-Fraud Culture in Your Telecom Organization From FRAUD ASSURE

Insider Fraud: How to Create an Anti-Fraud Culture in Your Telecom Organization

interview with Mark Yelland

Thirteen years after the WorldCom scandal, experts generally agree that insider fraud remains a massive problem in telecom.  In this article you’ll learn the outlines of building a program to instill an anti-fund culture at your telecoms organization.

The Bluejay Speaks: How to Rise above the Chatter, Grow Followers, and Deliver Rich, Powerful Content on the Web From ORGANIZATION

The Bluejay Speaks: How to Rise above the Chatter, Grow Followers, and Deliver Rich, Powerful Content on the Web

interview with Michael Bluejay

Telecom professionals need to constantly hone their web communication and marketing skills.  Here we interview a high Google ranking website author who shows how to communicate with power on any subject via the web.

IRSF Protection: Software that Blocks Telecom Fraud at the Enterprise PBX From FRAUD ASSURE

IRSF Protection: Software that Blocks Telecom Fraud at the Enterprise PBX

interview with Roger Ansin

The richest criminal path to International Revenue Share Fraud (IRSF) goes through the enterprise PBX.  Hijacking the PBX has cost businesses and telecoms countless billions of dollars in the past 15 years.  In this interview you’ll learn about this industry challenge and an affordable and proven tool that blocks IRSF at the enterprise.

Recent Articles